Global

Control Links

Themes

Posted: Saturday, 26 January 2013

Edit

You can edit this post.. Click read more if you aren't on this page

On this day, anonymous has managed to hack into the website of one once under the US Government's control: http://www.ussc.gov/. The hack seems to be in retaliation to Aaron Swartz death and reflects the anti-US views that the online community are slowing gaining through the abuse of power over trivial and small issues that have better been forgotten. It also appears to be linking to files relating to US built warheads.

They're the weakest website counter site ever, every single page view is counted as a "hit". With a script to automate the process, you can put that number to the millions..

There is ip detection with webcounters on that site, no anything.. The developers were far too lazy to implement that... Actually, I've got a better webcounter that practically does the same thing:
This site has gotten: pageviews

Posted: Tuesday, 22 January 2013

Update as of October 2013: no longer works!

Flaw was open for 10+ months

I'd like to congratulate the developers for spreading the word on the furry community, great job :)

However there's one critical flaw to the game, it uses Appspot and a completely unencrypted gifting/cloud saving system..

Sure there are some horrifically low level protection included (such as "encoding" the data in hex form) but, of course, that was no match for me...

There's really no encryption or any protection that can be found on the way Happy Street handles it's online services, the Happy Street system is wide open....

This is basically what I consider to be the flaw of Happy Street, it's unencrypted... And for a game that attracts millions of players from multiple platforms, you would expect the developers to be a little more careful when it comes to scenarios like this.. However, they're not..

Posted: Sunday, 20 January 2013

Well done Kim DotCom, and the rest of the MEGA team, give yourselves a clap on the back - Or you've probably already did.. What you've done will revolutionize content on the internet forever. Personally, I'm surprised, not at the interface and the design of the site [nice api's btw - very unixy] but by the fact that the New Zealand government allowed Mega to go ahead with their plans. That's a very good and clear indication to the American government that countries are slowly trying to rebel against them and to invalidate all attempts for the American government to seize control over offshore content.

New Zealand will be the home of our new website: Mega.co.nz - Powered by legality and protected by the law.
— Kim Dotcom (@KimDotcom) November 12, 2012

Aaron Swartz's death will not be in vain, since users from all over the world can share content with the knowledge that they won't be looked at, ever.. And so government agencies have no proof of data being shared online, and thus no legal consequences can be held to both the participants and MEGA..

Posted: Friday, 18 January 2013

To easy? Amirite? No, but really, if you need a lv8 [45x] progress save then comment on this post or something... Or you can waste your time and build upon the save file contained in the links.

The save is hashed and unlike temple run 1, there is no resume feature or auto submission to Game Center - The only way to gain scores without jailbreaking is to do so legitimately

Personally, I think that the developers have done a great job in adding an extra twist into the game by spicing it up, and would like to congratulate them for raising awareness to the iOS developer community on the fact that cheat prevention is pretty simple...

If you were to look at my Stackoverflow account, you'll see me sitting on some modest amount of reputation points..

It took me 2 months to gain that amount of points - with pure effort, and I feel horrible right now about it. Those numbers don't attribute to anything and I've wasted my life pursing that project and those points...

Posted: Tuesday, 15 January 2013

Aaron Swartz was faced with serve and serious charges, for crimes that he did not commit nor did any parties involved wanted pressed - aside from the US government. Usually, I don't favor the opensource community for being so hypocritically closedminded, but in the case of a trivial matter of trying to release information from the public domain to the public from a private organisation, but like many people, I find this exposure posthumous. What really got me today was the fact that the US has droppedsaidcharges - 50 years in prison. No-one really cared about this case before this event, possibly because of the exposure it had gotten. However - like other typical media sites, I'd like to congratulate Aaron, for co-creating the world's largest open social sharing site, and for co-creating RSS and for contributing to the opensource community. But whatever the US government had planned to attack the opensource community. They should stop.

So being a developer and all that, I decided to take at look at isitchristmas.com during Christmas when the servers were still transmitting collaborative data to users across the world. So, I developed some scripts for the site [independently], as you'd expect. Along with other developers who looked at the console.
Since stackoverflow.com is down right now, and the isitchristmas.com site is redundant. I'm going to share some media that I created as a result of that hackfest. Enjoy!

Posted: Saturday, 12 January 2013

Github uses markdown for it's .md readme's - the one that you typically see rendered as html at bottom of a github project page. Consequently, bolding a text is as simple as wrapping the text using two asterisks **Bold text here**, which will produce a text enclosed with the strong tag - ie: bolding the text.

Doing some very basic hacking.. It looks like iOS6 doesn't allowmodificationx to the file directories of actual apps, else I would be releasing some mad hack for iOS [that I created while I was still on iOS5]. However, I still have my Second Gen iPod Touch to save my arse, still being stuck on iOS 4.2.1 has it's perks.

If you own an iPhone or pretty much any iDevice and ever had a need to clear out the Photo Roll (also known as the "Photo App"), you might find that you're unable to delete everything off the phone at once though Apple's inbuilt app.

This is because you cannot directly delete folders, such as the "Camera Roll" fold off an iPhone, instead doing so individually.

To delete photos off an iPhone however, you first plug the device into a computer and delete photos in batch.

Which are the following steps:

Visit "My Computer"/"This PC".

Select the device of which you want to delete files from.

Navigate to the hard drive directory called "Internal Storage".

Navigate to the folder called "DCIM".

And there will be a collection of folders of which you would have to perform the step below in each and every one of them:

Press Control+A to select all the images from each of the folder and press the "Delete" key in order to delete them.

There is considerable benefit to using the baked-in method of deleting files of the iDevice as opposed to an external solution, as instead of having to rely on external software or software downloads alongside the hassle of spending money on spammy software, all the functionality that you require in order to delete photos are there on your computer already.

Posted: Monday, 7 January 2013

Is Google blocking Window Phone users from using Google maps?

Google has been in intense competition with Microsoft, both companies offer rival services and products. However, outside of lawsuits and courts, Microsoft consumers are slightly feeling the burn, with the Google maps mobile page being redirected to the Google homepage when visited by a Windows Phone.

So what exactly is going on? Well, the useragent can tell everything about a browser and when spoofed properly, can trick websites into revealing what's really going on. One simple way to spoof the useragent is to use this website: http://www.wannabrowser.com/index.php, alternatively you can spoof the useragent by changing browser settings or by using a custom browser.

Below is a basic test of spoofed useragents, to try to see what's going on and to identify the culprit.

Been working on a project for quite sometime, it was planned to be integrated with another one of my projects but I decided against it and decided to release it as open source... So here it is, a quick and simple measurements converter